Post job

Cyber Security Analyst remote jobs

- 528 jobs
  • CYBER SECURITY ANALYST (level III OR IV)

    Sterling Engineering, Inc.

    Remote job

    Title: Vulnerability Analyst Hire Type: 1-year contract Hourly Pay Range: $60-$80/hr Benefits: Medical, dental, vision, 401(k) with match, paid sick time Sterling Engineering is seeking a Vulnerability Analyst to support a National Laboratory's Cyber Security Program Office (CSPO). This remote opportunity offers a chance to contribute to national cybersecurity efforts by identifying and mitigating vulnerabilities across complex systems. Job Duties: Conduct vulnerability assessments using tools like Tenable, Nessus, Qualys, and Nucleus Security Analyze and prioritize vulnerabilities based on risk and severity Assign and track remediation tickets as part of “Cyber Hygiene” process Collaborate with IT and development teams to recommend mitigation strategies Document vulnerability status and remediation actions Generate bi-weekly, monthly, and quarterly reports for stakeholders Support cloud, container, and DevSecOps vulnerability scanning and hygiene Identify automation opportunities using scripting languages (Python, Bash, etc.) Assist in vulnerability tool review and tuning Participate in virtual team meetings and provide regular status updates Qualifications: 3+ years of experience in vulnerability assessment or cybersecurity analysis Proficiency with vulnerability scanning tools (Tenable, Nessus, Qualys, etc.) Familiarity with penetration testing tools (Metasploit, Burp Suite, Nmap) Strong understanding of Windows, Linux, and mac OS systems Experience with network protocols and security configurations Scripting skills in Python, Bash, or PowerShell Knowledge of NIST Cybersecurity Framework and NIST 800-53 controls Excellent written and verbal communication skills Ability to work independently and collaboratively in a remote setting U.S. citizenship required for system access Preferred Certifications: CISSP, CEH, Security+, CISM, OSCP, or GSEC Qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or genetic information.
    $60-80 hourly 56d ago
  • Cyber Analyst, Digital Forensics Incident Response

    Bay 4.7company rating

    Remote job

    Why you should join our At-Bay Security team: At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers. The Role: Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via: Forensically sound collection, transmission, and storage of digital evidence Analysis of digital evidence to identify indicators of compromise and adversary activity Development of incident timelines and theories of compromise Identification of incident root causes Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.) Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds Development and delivery of incident response training and simulations for targeted insureds Key skills: Previous digital forensics and incident response experience Strong oral and written communication skills Previous hands-on experience performing digital forensics and incident response, including several of the following: Business Email Compromise Ransomware Digital evidence collection and analysis Development and analysis of cyber threat intelligence Leadership of or participation in investigations involving digital evidence Intrusion detection / cyber threat hunting Malware analysis Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc. Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) Minimum requirements: Bachelor's degree or equivalent Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline Willingness to travel as needed to perform job functions Preferred requirements: Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity Previous background in law enforcement or government/military with experience leading complex technical investigations Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) Experience in a top-10 cyber consulting firm or leading DFIR provider preferred One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) Work location: USA, Nationwide Fully Remote Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent. #LI-CK1
    $80k-115k yearly Auto-Apply 10d ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 43d ago
  • Cyber Threat Analyst (Remote - US)

    Jobgether

    Remote job

    This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber Threat Analyst in the United States. In this role, you will be at the forefront of protecting critical IT infrastructure and data by monitoring, analyzing, and mitigating cyber threats. You will work within a dynamic security team, leveraging advanced tools and techniques to detect vulnerabilities, respond to incidents, and enhance overall organizational security posture. The position requires strong analytical skills, attention to detail, and the ability to collaborate with stakeholders across the organization. You will contribute directly to safeguarding sensitive information, supporting compliance efforts, and continuously improving security processes. This is an opportunity to make a tangible impact while working in a fast-paced, mission-driven environment focused on innovation and excellence in cybersecurity. Accountabilities: Monitor network traffic and systems to detect potential threats and vulnerabilities. Conduct threat analysis, vulnerability assessments, and security audits. Respond to security incidents and participate in incident response drills. Collaborate with IT and security teams to implement preventive and corrective measures. Develop and maintain comprehensive threat intelligence reports and security documentation. Contribute to the creation and improvement of security policies, procedures, and best practices. Engage in ongoing training and professional development to stay current with emerging threats and technologies. Requirements Bachelor's degree in Computer Science, Cybersecurity, or a related field. Minimum of 4 years of experience in cybersecurity, focusing on vulnerability management, threat intelligence, or SOC operations. Strong understanding of network protocols, operating systems, and secure architectures. Experience with security tools such as SIEM, EDR, MDM, firewalls, and intrusion detection systems. Excellent analytical, problem-solving, and communication skills. Relevant certifications (CISSP, CEH, CISA, GCFA, GCTI, GCFE, GCFR, GNFA) are a plus. Familiarity with scripting languages (Python, PowerShell) and understanding of current cyber threats is preferred. Ability to work effectively under pressure and meet tight deadlines. Benefits Competitive compensation and flexible time off (~22 days average). Remote-friendly work environment with flexibility. Opportunity to work in a mission-driven company transforming healthcare. Professional development programs and employee-driven initiatives. Collaborative, talented team committed to meaningful outcomes. Membership in supportive company communities and networking opportunities. Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching. When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly. 🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements. 📊 It compares your profile to the job's core requirements and past success factors to determine your match score. 🎯 Based on this analysis, we automatically shortlist the 3 candidates with the highest match to the role. 🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed. The process is transparent, skills-based, and free of bias - focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team. Thank you for your interest! #LI-CL1
    $76k-102k yearly est. Auto-Apply 5d ago
  • Cyber Security Analyst

    Ingenovis Health, Inc.

    Remote job

    We are looking to add a cyber security analyst team member to our IT Department. The cyber security analyst will play a key role in enhancing and improving the security posture across the organization. You will be responsible for identifying and mitigating areas of vulnerability and potential exposure from a cyber security standpoint. The successful candidate will have hands-on and practical experience in areas of cyber and data security, cyber security methodologies and frameworks, including experience in establishing both technical and organizational controls to protect the confidentiality, integrity, and availability of data. RESPONSIBILITIES Provides seamless customer service support to end users in relation to cyber security within the organization. Works closely with operations staff, IT management and information security teams. Builds a security minded culture that keeps communication and transparency at the forefront of securing the organization. Demonstrate working knowledge in the following: Networks and Network Security, Identity & Access Management, Data Management, Incident Management and Threat & Vulnerability Management. Perform information security reviews and scans of designated systems to assess the effectiveness of overall system security, identify vulnerabilities and make mitigation recommendations. Support the implementation, operation, and maintenance of vulnerability management projects. Proactively collaborate and communicate within the IT team to address and mitigate vulnerabilities actively leveraged by malicious actors. Recommend and support the implementation, operation, testing and on-going sustainment of HIPAA and PHI/PII security and compliance. Constantly working to evolve and improve technologies and processes to ensure confidentiality, integrity and availability of data. Perform enterprise vulnerability scanning, secure configuration baseline verification, tool validation, data and identity protection activities. Detect and, as required, perform, or oversee remediation of information security vulnerabilities to minimize risks to operating environments. Collaborates with external vendors and service providers, auditors or partner organizations to further cyber security objectives, reviews, mitigations and overall security posture improvements. Seeks opportunities for additional responsibilities and growth within organization. Shows initiative and enthusiasm in suggesting and implementing new concepts and/or ideas for improvement. These areas include IT cyber security support and troubleshooting, project management, system design and implementation. Other duties as assigned. REQUIREMENTS AND EXPERIENCE Bachelor's Degree in Computer Science, Healthcare Information Technology, or relevant field or equivalent knowledge and skills obtained through a combination of education, training and experience required. Knowledgeable and deep understanding of vulnerability and risk management. Experience with NIST frameworks preferred. Strong verbal and written communication skills required, and problem-solving ability. Minimum of 3 years of experience with vulnerability scanning and reporting assessment tools. Ability to articulate raw vulnerability and audit data into executive reports. Experience with patch management software. Understanding of SEIM / Log Aggregation tools. Familiar with attack and exploitation techniques involving operating systems, applications, and devices. Minimum of five (5) years of experience in configuration management compliance baselines for Windows, Mac, Linux. Minimum of three (3) years of experience with Incident Response Team (IR/IRT) troubleshooting, root cause analysis and remediation verification. Knowledgeable of Identity Management and authorization, least privilege, and reducing unauthorized elevated access. Understanding of Firewalls to include basic networking, sub-netting, IDS, NAT, ACL's. Deep knowledge of Office 365, Azure Security concepts and best practices. Minimum of five (5) years of experience in IT, information security, cyber risk management, compliance or a related field required; of which at least 3 years' experience in information security is required. Healthcare experience preferred. Strong interpersonal skills and ability to work both independently and as part of a team required Certification: One or more relevant information security-related certifications preferred. Examples include: CISSP, CISA, HCISPP, CCSP, CRISC, CISM, CGIH, GCFA, GNFA, GPEN, GSEC, QSA and CEH. Microsoft AZ-500 preferred. PHYSICAL DEMANDS AND WORK ENVIRONMENT Must have use of sensory skills to effectively communicate and interact with other employees and the public through use of the telephone, email, video conference and face to face contact Must have manual dexterity, visual acuity and hearing acuity to effectively use and operate office related equipment such as but not limited to a computer, copier, scanner, camera, phone, headset, keyboard and mouse Must be able to sit for extended periods of time at a keyboard and workstation with low periods of reaching and standing EQUAL EMPLOYMENT OPPORTUNITY STATEMENT Ingenovis Health is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind on the basis of race, color, national origin, religion, gender, gender identity, sexual orientation, disability, genetic information, pregnancy, age, or any other protected status set forth in federal, state, or local laws. This policy applies to all employment practices within our organization. RESERVATION OF RIGHTS Essential functions contained within this job description are listed above; they are subject to change at any time due to reasonable accommodation or other reasons set forth by management. SIGNATURE Employee signature below constitutes employee's understanding of the requirements, essential functions and duties of the position. Employee Name: Employee Signature: Date: Compensation Range $78,600.00 - $98,300.00 Benefits include: health, dental, vision, FSA/HSA, company-paid life insurance, 401K with discretionary match, paid time off, paid parental leave, and tuition reimbursement. Job will remain open until position is filled.
    $78.6k-98.3k yearly Auto-Apply 1d ago
  • Cyber Security Analyst (Tier 2)

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst (Tier 2) is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position This schedule for this role entails working every other weekend. Travel requirements: 0-5% yearly. CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 14d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • REMOTE Cyber Resilience Analyst

    Insight Global

    Remote job

    Insight Global is Seeking a Sr Cyber Resilience Analyst to join a top customer on a growing new team. As the Cyber Resilience Analyst, you will define operational activities and executes on strategic direction related to cyber resiliency for our customer's entire enterprise and guide colleagues in facilitating cyber resiliency activities across the enterprise. This person manages, develops and implements procedures, controls, and reporting to ensure compliance with NIST Cyber resiliency frameworks. Consults on efforts to continuously improve internal controls, processes, and systems to enhance the effectiveness and efficiency for the program. Partners with IT and business colleagues to educate on cyber resiliency and provide actionable metrics that measure the effectiveness of controls. Coordinate and manage activities of process owners to support cyber resiliency testing, including supporting audit requests and tracking remediation. Partner with key stakeholders, including senior management, Legal, Internal Audit, and external assessors, to ensure alignment and support of the cyber resiliency Program. Compensation: $50-55/hour Exact compensation may vary based on several factors, including skills, experience, and education. Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements - 7+ years of cyber resiliency related activities or experience, internal audit, external assessments, risk management, regulatory compliance, and information security in a corporate environment - 5+ years of experience in understanding of cyber resiliency framework including its requirements, regulations, and implications for financial reporting and internal controls. - 5+ years of experience in audit methodologies, internal control frameworks, risks assessments, and control testing techniques. 3+ years of program management including strategic planning, decision-making, and project management - Strong understanding of relevant regulations and frameworks aligning to NIST and ISO - Strong analytical and problem-solving skills with the ability to analyze and interpret complex regulations, operational data, trends, assess risks effectively, and make recommendations for improvement. - Exceptional interpersonal skills with the ability to collaborate across departments and influence stakeholders at all levels - Demonstrated ability to collaborate effectively with cross-functional teams, build relationships with key stakeholders, and influence others to achieve compliance objectives. - Strong attention to detail and accuracy when conducting assessments, documenting processes, and reviewing controls to ensure compliance with cyber resiliency requirements. - Managing work efforts with both internal and external partners in a highly collaborative environment - Excellent written and verbal communication skills with the ability to articulate complex concepts clearly and concisely Ability to navigate and execute in a large complex organization
    $50-55 hourly 8d ago
  • Consultant - Cyber Security Analyst (Fractional/Contract Role)

    Arootah

    Remote job

    Job DescriptionJoin our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices. Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young. Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office. What You'll Do Best practice reviews. Developing realistic and effective action plans. Breaking apart goals into actionable steps. Advising on vendor selection and oversight. Creating and implementing policies, procedures, and control measures. Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices. Special projects or other areas of need. Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security. Protect sensitive information by installing and configuring security software like firewalls and encryption programs. Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents. Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps. Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats. Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster. Assesses new security technologies to determine potential value for the firm. Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur. Review, investigate, and respond to real-time alerts within the environment. Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations. Qualifications A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record. One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications. 5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office. Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar. Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems. In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events. Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO. Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Job Status Contractor Hours are based on the needs of the assigned client (0-40 hours per week). The hourly consulting rate of pay is expected to be a minimum of $125 and a maximum of $250, per hour. The hourly rate will be determined by several factors which may include, but are not limited to, the length of the individual engagement, level of difficulty, level of specialization required, professional designations, skills, and years of experience.Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join! For more information, visit us at Arootah.com. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $80k-109k yearly est. 27d ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 27d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Classified Cyber Security Staff / ISSM / Goleta, CA

    Lockheed Martin Corporation 4.8company rating

    Remote job

    You will be the Classified Cyber Security Staff for the Santa Barbara Focal Plane Infrared Sensors Business. Our team is responsible for safeguarding critical mission‑critical information systems and ensuring compliance with government security mandates. What You Will Be Doing As the Classified Cyber Security Staff you will be responsible for leading information‑system security strategy and operations within the Santa Barbara Focal Plane Infrared Sensors Business. Your responsibilities will include, but are not limited to: * Oversee day‑to‑day information system security operations as the ISSM on all technical security matters. * Review and oversee RMF package authorizations to maintain continuous authorization. * Monitor, analyze, and respond to security events and incidents. * Document compliance actions, manage POA&Ms, and maintain automated tracking. * Participate in internal and external security audits, risk assessments, and investigations. Why Join Us We seek a collaborative, mission‑focused professional who thrives in a fast‑paced, high‑impact environment. This role offers the opportunity to shape the security posture of cutting‑edge infrared sensor systems, work with expert engineers, and drive meaningful results that protect national security. We are committed to supporting your work‑life balance and overall well‑being, offering flexible scheduling options. Learn more about Lockheed Martin's comprehensive benefits package here. Further Information About This Opportunity This position is located in Goleta, CA. Discover more about Lockheed Martin Missiles and Fire Control. MUST BE A U.S. CITIZEN - This position is located at a facility that requires special access. The selected candidate must possess an active Top Secret clearance to start. Basic Qualifications: * DoD 8570 IAM Level III certification * Hands on experience with industry standard Information Assurance tools required to achieve accreditation of systems to include vulnerability scanning tools, auditing tools, endpoint protection tools, Security Incident and Event Mgmt (SIEM) tools, package submission tools. Ability to perform an analysis in order to determine path forward in regards to policies and procedures and how to resolve discrepancies. * Experience driving the RMF process while working with government accreditation authorities for approvals and the ability to perform risk and vulnerability assessments in line with current regulatory guidelines such as DAAPM/JSIG/ICD 503. * Ability to motivate, influence and performance manage people with classified cybersecurity skills. * Ability to effectively translate and connect the cybersecurity objectives and program requirements to broader business outcomes both financially and operationally often requiring effective communication and relationship building with internal stakeholders and external customers. * Top Secret with ability to obtain SCI Desired Skills: * Currently working in environment supporting IC customers * Must have the ability to work on site full-time * Proved ability to obtain and maintain system ATOs * Hands-on experience with ICD 503/JSIG and DAAPAM * Experience implementing new and complex technologies at multiple classification levels within large environments and at an Enterprise level. * Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Master's degree. * Prior FSO/CPSO experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Top Secret with Investigation or CV date within 5 years Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 4x10 hour day, 3 days off per week Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $113,900 - $200,905. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $131,000 - $227,125. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: MISSILES AND FIRE CONTROL Relocation Available: Possible Career Area: Cyber Security Type: Full-Time Shift: First
    $77k-100k yearly est. 13d ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Remote job

    **MANTECH** seeks a motivated and detail-oriented **Cyber Security Analyst** to join our team in **Dahlgren. VA.** This position is **on-site.** **Responsibilities include but are not limited to:** + Work as an early-career computer scientist with emphasis on Linux, Python, Bash, and containerization for use in DoD applications + Develop, maintain, and enhance software systems, focusing on Linux systems administration, automation, and scripting, particularly in Python + Work with container environments, including Docker, Kubernetes, and Podman, to support software development and deployment + Collaborate with teams to ensure system-level requirements are met, including writing test cases, scenarios, and procedures + Execute test procedures, analyze results, and produce detailed trouble reports to support system developers and subject matter experts + Participate in Test and Evaluation (T&E) of cybersecurity systems, with a focus on software certification + The ability to travel to locations within the United States including Newport, RI, Washington DC, Philadelphia, PA to support test events and meetings (up to 20%) **Minimum Qualifications:** + Associate's Degree in Computer Science, Information Technology, or a related discipline + Foundational understanding of computer networking + 2+ years of professional experience in software engineering + Experience with Linux systems administration, scripting/automation, and Python programming + Experience with container environments (Docker, Kubernetes, and Podman) **Preferred Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related discipline + Experience in operations and build toolchains, including GCC + Preferred familiarity of Operational Technology, like ICS and SCADA systems + Possession of an active IAT II Certification **Clearance Requirements:** + U.S. Citizenship required and an active Secret security clearance **Physical Requirements:** + Ability to work effectively in a remote working environment. + A dedicated, quiet, and ergonomically appropriate workspace conducive to productivity. + Ability to sit at a desk or workstation for extended periods while working on a computer. + Occasional movement within the office for communication and accessing resources. MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $69k-90k yearly est. 20d ago
  • Lead Cyber Defense Analyst - Remote

    Experian 4.8company rating

    Remote job

    Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to accomplish their financial goals and help them save time and money. We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments. We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com. As a Cyber Defense Lead, you will join Experian's Cyber Fusion Center, performing in-depth analysis, evaluation and response to security threats. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. It is the first line of defense in Experian's broader incident response and incident management responsibilities. The team receives and triages cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). You will report into the Sr. Manager of SecOps and Threat Detection. You'll have opportunity to: + Monitor the daily operations of the team, being the primary liaison between analysts and leadership + Provide advanced support and act as a designated contact for the Cyber Defense Analysts (e.g., consulting on investigation / analysis) + Oversee response activities for security events and alerts associated with cyber threats, intrusions, or compromises + Use investigative experience and technical skills to analyze events using security tooling and logging (e.g., SIEM, EDR) and assess potential risk + Monitor for anomalous changes in metrics, notable open incidents, quality concerns, or observed risks + Complete assigned caseload throughout the incident response lifecycle, including analysis, containment, eradication, recovery, and lessons learned + Ensure incident updates are performed, documented and that case hand-off processes are completed + Be a mentor to Cyber Defense Analysts, providing feedback on the quality of work to analyst(s) and management + Lead the development of relevant Standard Operating Procedures (SOPs), and training materials + Collaborate with the Cyber Threat Intelligence (CTI) and content development teams (Threat Detection Engineering) on use case developments + 5+ years of information security experience working within a Security Operations Center or Cyber Security Incident Response Teams; at least 1 of which ideally includes experience as a team lead + Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security, or a related field. + History of interpreting device and application logs from a variety of sources (e.g., Firewalls, Proxies, System Logs, Splunk) to identify cause + 1+ professional certifications related to Digital Forensics, Incident Response, or Ethical Hacking(e.g., GCIH, GMON, GSOC, CEH, GCFA, ENCE) + Information security management certifications (CISSP, CISM) + Knowledge of the Incident Response Life Cycle, MITRE ATT&CK Framework, and Cyber Kill Chain + Understanding of common Operating Systems (Windows, Linux, Mac OS), Networking (Firewalls, Proxies, NetFlow), Cloud Infrastructure (AWS, Azure, GCP), and Security Technologies (Anti-Virus, Intrusion Prevention, Web Application Firewalls) + Experience with Security Monitoring applications such as SIEM (e.g., QRadar, Splunk), EDR (e.g., CrowdStrike Falcon, Microsoft Defender) + Experience with SOAR technologies such as Palo Alto XSOAR and Google SecOps (Chronicle) + Security analysis and architecture knowledge using tools including Defender for Cloud, Wiz.io, GuardDuty, CloudTrail, or CloudWatch. + Record of improving the way work is performed, originating action and ideas to lead enhancements to existing processes. + Abvailable to work outside of normal work hours to respond to cybersecurity incidents Benefits/Perks: + Great compensation package and bonus plan + Core benefits including medical, dental, vision, and matching 401K + Flexible work environment, ability to work remote, hybrid or in-office + Flexible time off including volunteer time off, vacation, sick and 12-paid holidays + Explore all our exciting benefits here: ************************************************ At Experian, our people and culture set us apart. We're deeply committed to creating an environment where everyone feels they belong and can excel. From inclusion and authenticity to work/life balance, development, wellness, collaboration, and recognition, we focus on what truly matters. Our people-first approach has earned us global recognition: World's Best Workplaces 2024 (Fortune Top 25), Great Place To Work 2025 in 26 countries, and Glassdoor Best Places to Work 2024, among others. Want to see what life at Experian is really like? Explore Experian Life on social or visit our Careers Site. Our compensation reflects the cost of labor across several U.S. geographic markets. The base pay range for this position is listed above. Within this range, individual pay is determined by work location and additional factors such as job-related skills, experience, and education. You will be also eligible for a variable pay opportunity. Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity. #LI-Remote
    $89k-121k yearly est. 56d ago
  • Security Analyst - Systems Administration I

    Mercer Advisors 4.3company rating

    Remote job

    Why Work at Mercer Advisors? For 40 years, Mercer Advisors has worked with families to help them amplify and simplify their financial lives. How? By integrating financial planning, investment management, tax, estate, insurance, and more, all managed by a single team. Today we proudly serve over 31,300 families in more than 90 cities across the U.S. Ranked the #1 RIA Firm in the nation by Barron's, we are an independent, national fiduciary legally obligated to always act in the best interest of our clients.* Mercer Advisors offers a distinct work environment that stands out in the financial industry. Our overall employee base and client-facing team are composed of 50% women, reflecting our commitment to diversity. We attract top talent from across the country, with no formal headquarters and flexible working arrangements, allowing us to assemble the best team possible. Join us and be a part of a team dedicated to making a meaningful impact on the financial lives of families across the country. * Mercer Advisors was ranked #1 for RIA firms with up to $70 billion in assets. The Barron's top RIA ranking is based on a combination of metrics - including size, growth, service quality, technology, succession planning and others. No fee was paid for participation in the ranking, however, Mercer Advisors has paid a fee to Barron's to use the ranking in marketing. Please see important information about the ranking criteria methodology here. Job Summary: We are seeking a dynamic and results-driven Security Analyst / System Administrator I to join our security operations team. This hybrid role will fast track the employee to fully integrate into the IT team. The ideal candidate will have hands-on experience with SIEM, EDR, IAM, and firewall technologies, and a proven track record of reducing incident response times, remediating vulnerabilities, and enhancing audit readiness. This role is perfect for someone who thrives in fast-paced environments and is passionate about protecting digital assets through proactive threat detection and automation. Essential Job Functions for this role include: Administers, installs, and troubleshoots a variety of operating systems including but not limited to: Microsoft 365: Azure AD, Active Directory, SharePoint Online, and InTune Amazon Web Services Zoom Box Theta Lake Salesforce Salentica Brivo Monitor, investigate, and respond to security alerts using SIEM platforms such as Sumologic and/or Crowdstrike. Deploy and manage endpoint protection tools across enterprise environments. Administer IAM systems, specifically Entra ID, implementing SSO, MFA, and SCIM provisioning. Configure and maintain firewalls across Azure, Cloudflare, and Meraki platforms. Assist in vulnerability assessments and remediation, ensuring compliance with SOC 2, NIST 800-53, and ISO 27001 frameworks. Perform packet analysis and threat hunting using industry standard tools. Support data loss prevention efforts using Box Shield and Proofpoint. Collaborate on audit evidence gathering and compliance documentation. Automate security workflows and onboarding procedures using Python, PowerShell, and logicapp scripting. Provide systems support for various applications, encryption tools, and endpoint management. Knowledge, Skills, and Abilities: Bachelor's degree in information systems technology or Cybersecurity. 2+ years of experience in cybersecurity or IT support roles. Strong knowledge of SIEM, EDR, IAM, and firewall technologies. Familiarity with compliance standards such as SOC 2, NIST, and ISO. Experience with scripting and automation (Python, PowerShell). Excellent communication and documentation skills. Certifications Preferred: CompTIA Security+ CompTIA Network+ Work Schedule: This professional role requires availability Monday through Friday, 8:00 AM - 5:00 PM. Working Conditions: Professional office environment, daytime hours, working inside, standing, and sitting, will be assigned to a workstation. Benefits: Mercer Advisors offers a competitive and robust benefit package to our employees. Our benefit programs are focused on meeting all of our employees and their eligible dependents health and welfare needs. We offer the following: Company Paid Basic Life & AD&D Insurance Company Paid Short-Term and Long-Term Disability Insurance Supplemental Life & AD&D; Short-Term Disability; Accident; Critical Illness; and Hospital Indemnity Insurance Three medical plans offerings including two High Deductible Health Plans and a Traditional Co-Pay medical plan. Health Savings Account (HSA) with company contributions on a per pay period basis if enrolled in either HDHP medical plan. Two comprehensive Dental Plans Vision Insurance Plan Dependent Care Savings Account for child and dependent care. 14 Company Paid Holidays with a full week off at Thanksgiving. Generous paid time off program for vacation and sick days Employee Assistance Plan Family Medical Leave Paid Parental Leave (6 weeks) Maternity benefits utilizing company paid STD, any supplemental STD, plus Parental Leave (6 weeks) to provide time for recovery, baby bonding, and enjoying your family time. Adoption Assistance Reimbursement Program Company Paid Concierge Services for you and your loved ones for the spectrum of caring needs for your aging parents, young children, life's challenges and more. 401(k) Retirement Plan with both Traditional and Roth plans with per pay period match Pet Insurance We are not accepting unsolicited resumes from agencies and/or search firms for this job posting. Mercer Advisors provides equal employment opportunity to all applicants and employees without regard to age, color, disability, gender, marital status, national origin, race, religion, sexual orientation, gender identity and expression, physical or mental disability, genetic predisposition or carrier status, or any other characteristic protected by law in accordance with all applicable federal, state, and local laws. Mercer Advisors provides equal employment opportunity in all aspects of employment and employee relations, including recruitment, hiring, training and development, promotion, transfer, demotion, termination, layoff, compensation, benefits, and all other terms, conditions, and privileges of employment in accordance with applicable federal, state, and local laws. If you need an accommodation seeking employment with Mercer Advisors, please email *****************************. This email is for accommodation requests only. Accommodations are made on a case-by-case basis. Applicants have rights under federal employment laws: Family and Medical Leave Act (FMLA) Employee Polygraph Protection Act (EPPA) Equal Employment Opportunity (EEO) U.S. Federal law requires all employers to verify the identity and employment eligibility of all persons hired to work in the United States. Mercer Advisors participate in E-Verify to confirm work authorization. E-Verify Right to Work If you are a resident of California, learn more about Mercer's California Consumer Privacy Policy here. CCPA Notice at Collection
    $76k-117k yearly est. Auto-Apply 8d ago
  • Senior Information Security Specialist-SECRET CLEARANCE REQUIRED

    Latitude Inc.

    Remote job

    Primary Responsibilities: Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization. Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation. Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts. Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment. Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats. Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps. Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment. Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures. Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance. Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments. All other duties as assigned by management. Qualifications Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education. Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies. Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS). Minimum of (5) years of experience with Security Information and Event Management (SIEM). Minimum of five (5) years of experience in the risk management framework. Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases. Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred. Must have an active DoD Secret Clearance.
    $82k-116k yearly est. Auto-Apply 42d ago
  • Information Security Specialist - LOGIS

    Minnesota City Jobs

    Remote job

    LOGIS has an opportunity for an Information Security Specialist within our Network Services Team. This position is responsible for monitoring and analyzing security events, leading incident response efforts, performing risk, vulnerability, and threat assessments - including threat intelligence and threat hunting activities. In addition to the technical responsibilities, this role provides security guidance, supports compliance initiatives, and drives continuous improvement in detection and response capabilities. We strive to be a premier employer offering competitive compensation and a generous benefits package, including participation in the PERA pension plan. In addition, we offer a predominantly remote work schedule. Salary will be dependent on qualifications and experience. The position is open until filled. Applications will be reviewed on an ongoing basis as they are submitted. Please submit a resume and cover letter to **************. Go to the LOGIS website for the full job description ******************************
    $76k-108k yearly est. 9d ago
  • Info Security Analyst II / IS - Information Security / Full-time

    Childrens Hospital Los Angeles 4.7company rating

    Remote job

    NATIONAL LEADERS IN PEDIATRIC CARE Ranked among the top 10 pediatric hospitals in the nation, Children's Hospital Los Angeles (CHLA) provides the best care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each year. From primary to complex critical care, more than 350 programs and services are offered, each one specially designed for children. The CHLA of the future is brighter than can be imagined. Investments in technology, research and innovation will create care that is personal, convenient and empowering. Our scientists will work with clinical experts to take laboratory discoveries and create treatments that are a perfect match for every patient. And together, CHLA team members will turn health care into health transformation. Join a hospital where the work you do will matter-to you, to your colleagues, and above all, to our patients and families. The work will be challenging, but always rewarding. It's Work That Matters. Overview PLEASE NOTE: This is a remote position. In accordance with CHLA policy, candidates must establish primary residency in California prior to their start date. Purpose Statement/Position Summary: The Information Security Analyst II is responsible for monitoring and addressing information security alerts, improving detection and response capabilities, and participating in efforts to streamline processes and improve efficiency. They will also be responsible for conducting security training and awareness campaigns, reporting on results, and conducting remedial training. The analyst will contribute to information security policies and standards as they are developed and maintained, in accordance with NIST CSF and HIPAA. They will be a mentor for Information Security Analyst I and peers. Minimum Qualifications/Work Experience: Required: 5 years of progressive experience in computing and information security, including experience with information security operations, utilization of multiple security tools to conduct investigations, and security training, preferably in a healthcare environment. * Management of information security tools. * Knowledge of vulnerability resolution. * Skills in risk analysis and hands-on issue resolution. * General awareness of NIST CSF and HIPAA security rule. * Experience analyzing security incidents utilizing multiple security tools for discovery. * Strong analytical and problem-solving skills Education/Licensure/Certification: Required: Associate degree in a related field or equivalent combination of education and experience may be considered. Certifications in two of the following required: * ISACA * CompTIA * EC-Council * Azure Security * AWS Security * Cisco * (ISC)² * GIAC Pay Scale Information $75,712.00-$124,384.00 CHLA values the contribution each Team Member brings to our organization. Final determination of a successful candidate's starting pay will vary based on a number of factors, including, but not limited to education and experience within the job or the industry. The pay scale listed for this position is generally for candidates that meet the specified qualifications and requirements listed on this specific job description. Additional pay may be determined for those candidates that exceed these specified qualifications and requirements. We provide a competitive compensation package that recognizes your experience, credentials, and education alongside a robust benefits program to meet your needs. CHLA looks forward to introducing you to our world-class organization where we create hope and build healthier futures. Children's Hospital Los Angeles (CHLA) is a leader in pediatric and adolescent health both here and across the globe. As a premier Magnet teaching hospital, you'll find an environment that's alive with learning, rooted in care and compassion, and home to thought leadership and unwavering support. CHLA is dedicated to creating hope and building healthier futures - for our patients, as well as for you and your career! CHLA has been affiliated with the Keck School of Medicine of the University of Southern California since 1932. At Children's Hospital Los Angeles, our work matters. And so do each and every one of our valued team members. CHLA is an Equal Employment Opportunity employer. We consider qualified applicants for all positions without regard to race, color, religion, creed, national origin, sex, gender identity, age, physical or mental disability, sexual orientation, marital status, veteran or military status, genetic information or any other legally protected basis under federal, state or local laws, regulations or ordinances. We will also consider for employment qualified applicants with criminal history, in a manner consistent with the requirements of state and local laws, including the LA City Fair Chance Ordinance and SF Fair Chance Ordinance. Qualified Applicants with disabilities are entitled to reasonable accommodation under the California Fair Employment and Housing Act and the Americans with Disabilities Act. Please contact CHLA Human Resources if you need assistance completing the application process. Our various experiences, perspectives and backgrounds allow us to better serve our patients and create a strong community at CHLA. Information Security
    $75.7k-124.4k yearly 15d ago
  • Security Systems Engineer (Remote)

    Cisco 4.8company rating

    Remote job

    The application window is expected to close on 12/08/2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. **AI at Cisco** With Cisco, you're not just embracing the future - you're helping create it! We are focused on integrating AI into our solutions to transform collaboration, security, networking, observability, and more. We are innovating ethical AI products and infrastructure that enable our customers to stay ahead of cyberattacks, predict and prevent network outages, and make team meetings more productive. Our extensive data sets and broad customer reach means limitless possibilities for you to build impactful AI solutions that solve a wide array of real-world problems. Join us at Cisco where you will innovate with top AI experts and be a part of our mission to power an inclusive future for all. **AI in the Business Unit** The Cisco Security group includes such industry leading security suites and products as Hypershield, Cisco Secure Access, Identity Intelligence, Duo, XDR, Cisco Security AI, Talos, and more. We are using machine learning and GenAI across our products to simplify security, prevent sophisticated attacks, and ensure the secure use of large language models (LLMs). In Security, we are building AI-enhanced cybersecurity for better outcomes, combining AI with the breadth of Cisco telemetry across the network, private and public cloud infrastructure, applications, internet, email, and endpoints. With Security AI, we make it simple to use natural language instruction and interact with GenAI - from deploying and managing firewall policies to streamlining incident response. With Duo, we are creating extensive machine learning and analytics to detect and block suspicious users. We are harnessing our rich security expertise in conjunction with AIML to transform the way we assist, augment, and automate security efforts for our customers! We need your help to tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors. **Meet the Team** You will be a part of our Cisco Security Innovation team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will bring your expertise in deep learning and large transformer models conduct research, design and development of state-of-the-art ML/AI techniques applicable to threat detection, including anomaly detection, behavioral analysis, signature generation, and predictive modeling. The techniques are focused toward realtime efficacy and evaluating scalable architectures. **Your Impact** + Leverage modern AI/ML techniques to improve the accuracy of threat detection solutions and automate/accelerate manual analysis processes. + Develop and implement advanced machine learning models across different hardware environments (including cloud and network edge); models may include adapting neural network architectures or creating novel ones to address challenges. + Develop methods to identify performance metrics and efficacy of the models especially of the hardware accelerated models. + Analyze and extract significant patterns in high-dimensional data spaces using advanced techniques. + Implement robust software systems for integrating and maintaining machine learning models. + Collaborate with software engineering teams to design primary deployment strategies for machine learning models into security systems. + Establish and maintain best practices for machine learning and security operations, including clear documentation of models and procedures. **Minimum Qualifications:** + Bachelor's degree or higher in Computer Science or related field + 5+ years of related security experience, specifically in the areas of network security environments + Experience with multi-threaded environments + Experience with Linux operating systems and embedded Linux environments **Preferred Qualifications:** + Master's or PhD degree in Computer Science, Computer Engineering, or a related field + Experience with state-of-the art machine learning techniques and libraries + Debugging skills in complex hardware/software + Coding experience with Python, C/C++, etc. + Experience with software development environments and version control systems (e.g. Git) + A strategic problem solver in the areas of threat detection and analysis + Experience optimizing machine learning or deep learning models for specific hardware + Familiarity with hardware acceleration libraries (e.g., Morpheus, cu DNN, TensorRT, OpenVINO). + Experience with containerization technologies (e.g., Docker, Kubernetes) in the context of hardware-specific deployments + Knowledge of cybersecurity concepts and threat detection methodologies + Low-level Kernel coding experience **Why Cisco?** At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. **Message to applicants applying to work in the U.S. and/or Canada:** The starting salary range posted for this position is $165,000.00 to $241,400.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time. U.S. employees are eligible for paid time away as described below, subject to Cisco's policies: + 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees + 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco + Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees + Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations) + 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next + Additional paid time away may be requested to deal with critical or emergency issues for family members + Optional 10 paid days per full calendar year to volunteer For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows: + .75% of incentive target for each 1% of revenue attainment up to 50% of quota; + 1.5% of incentive target for each 1% of attainment between 50% and 75%; + 1% of incentive target for each 1% of attainment between 75% and 100%; and + Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid. The applicable full salary ranges for this position, by specific state, are listed below: New York City Metro Area: $165,000.00 - $277,600.00 Non-Metro New York state & Washington state: $146,700.00 - $247,000.00 * For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined. ** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements. Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
    $165k-277.6k yearly 2d ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote job

    About the Role: United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do: Review and document the adequacy of security and technology controls across business and IT environments. Evaluate control posture through interviews, documentation reviews, and workflow analysis. Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. Partner with risk management and security leadership to align controls with organizational risk tolerance. Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. Document and advocate for control improvements that balance risk with operational efficiency. Support control development across testing, QA, and production environments. Present control effectiveness reports to senior risk leadership. Stay current on regulatory requirements, internal policies, and industry best practices. Participate in required compliance training and support internal/external audit activities. What We're Looking For: • Experience: 3+ years in cybersecurity or IT practitioner roles. 2+ years in IT risk or controls analysis. Practical experience with risk management and IT control frameworks. • Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. • Required Skills: Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). Experience with CIS CSC, ISO 2700, or NIST CSF. Excellent written and verbal communication across all organizational levels. Strong organizational skills and ability to meet SLAs. Sound judgment and decision-making in complex scenarios. High integrity, trustworthiness, and adaptability. • Preferred Skills: Certifications such as CISSP, CISA, CRISC, or CISM. Technical experience with enterprise networks, applications, and directory services. Familiarity with enterprise GRC platforms. Travel: Up to 5% travel required. Supervisory Responsibility: This position does not have direct supervisory responsibilities. Conditions of Employment: Must be able to pass a criminal background & credit check This is a full-time, non-remote position FLSA Status: Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
    $68k-87k yearly est. Auto-Apply 41d ago

Learn more about cyber security analyst jobs

Work from home and remote cyber security analyst jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for cyber security analysts, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a cyber security analyst so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that cyber security analyst remote jobs require these skills:

  1. Incident response
  2. Windows
  3. Siem
  4. Dod
  5. Linux

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a cyber security analyst include:

  1. Sentara Healthcare
  2. Logistics Management Institute
  3. Lockheed Martin

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a cyber security analyst:

  1. Automotive
  2. Health care
  3. Technology

Top companies hiring cyber security analysts for remote work

Most common employers for cyber security analyst

RankCompanyAverage salaryHourly rateJob openings
1NOVA Chemicals$99,364$47.770
2Center for Internet Security$94,561$45.460
3ICONMA$94,334$45.350
4Innovative Emergency Management$92,688$44.560
5Motion Recruitment$91,518$44.0012
6Jack Henry & Associates$90,188$43.360
7Huntington Ingalls Industries$89,611$43.0839
8SAIC$87,765$42.1921
9IT Concepts$85,470$41.090
10Lockheed Martin$81,683$39.27182

Browse computer and mathematical jobs